NWCCD 2017-18 Catalog 
    Sep 27, 2023  
NWCCD 2017-18 Catalog [This is an Archived Catalog.]

Add to Portfolio (opens a new window)

CSEC 1510 - Hardening Network Infrastructure

This course gives students an awareness of security related issues and essential skills they will need as network administrators in order to provide a secure LAN, WLAN or WAN network. The course explores secure network infrastructure, understanding core security concepts, managing secure access, VPN encryption, firewalls, intrusion prevention, web and email content security, and endpoint security. This course helps prepare students for the Cisco CCNA Security 210-260 certification exam which can be attempted after the student has achieved CCENT or CCNA certification status.

Successful completion of CSCO 2000 Cisco: CCNA 1 and CSCO 2020 Cisco: CCNA 2, or hold an active CCENT or CCNA certification or instructor consent

Minimum Student Competencies
Upon completion of CSEC 1510 Hardening Network Infrastructure , the student will:

  1. explain network security concepts and common principles.
  2. identify common security threats.
  3. outline the fundamentals of Virtual Private Networks (VPN) technology and cryptography.
  4. describe the fundamentals of IP security.
  5. detail the process of implementing IPSEC Site-to-site VPNs.
  6. outline the process of implementing SSL Remote Access VPNs.
  7. describe mitigation techniques for email-based and web-based threats.
  8. describe firewall function, placement, benefits and limitations.
  9. outline the process of implementing a zone-based firewall on a router.
  10. describe the process of implementing basic firewall policies on an adaptive security appliance (ASA).
  11. discuss the deployment, basic configuration and performance tuning of an intrusion protection system (IPS).
  12. describe common threats to layer 2 technologies (switches) and associated mitigation techniques.
  13. explore the Network Foundation Protection framework.
  14. discuss security best practices associated with the device management plane.
  15. discuss security best practices associated with the IPV4 and IPv6 traffic in the data plane.
  16. examine the control plane and secure routing protocols.
  17. describe the methods available to secure local access.
  18. investigate Bring Your Own Device (BYOD) architecture, components and mobility device management.

Credits: 3

Instructional Method Lecture/Lab

Contact Hours: 4.5 hours/week

Add to Portfolio (opens a new window)